Stephen E. Arnold: Big Data VERACITY & VALUE Join Volume, Variety, & Velocity (V5) — And We Still Only Process 1%…

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

VVVVV and Big Data

Somewhere along the line a marketer cooked up volume, variety, and velocity to describe Big Data. Well, VVV is good but now we have VVVVV. Want to know more about “value” and “veracity”? Navigate to “2 More Big Data V’s—Value and Veracity.” The new Vs are slippery. How does one demonstrate value. The write up does not nail down the concept. There are MBA type references to ROI, use cases, and brand. Not much numerical evidence or a credible analytic foundation is presented. Isn’t “value” a matter of perception. Numbers may not be needed. Veracity is also a bit mushy. What about Brian Williams’ and his oft repeated “conflation”? What about marketing collateral for software vendors in search of a sale? I typed 25 and moved on. Neither a big number nor much in the way of big data.

SchwartzReport: Net Net — Good New Rules from FCC — Bad Time Warner 97% Profit Margin

Advanced Cyber/IO, IO Impotency
Stephan A. Schwartz
Stephan A. Schwartz

GOOD: This is some wonderful news. The process is still not complete but the right decision appears imminent. Tele-communications are going to be seen as public utilities, equally open to all. There is still a vote to go, so it wouldn't hurt to write the FCC once again and tell them you support Chairman Wheeler's draft.

The head of the FCC just proposed the strongest net neutrality rules ever

BAD: This is why FCC Chairman Wheeler's plan is so important. Left to their own devices tele-communications companies would strip you down to you skives.

Time Warner Cable's 97 Percent Profit Margin on High-Speed Internet Service Exposed

John Robb: Bringing Down the (Corrupt) USA

Corruption, Government, Idiocy, Ineptitude, IO Deeds of War, IO Impotency
John Robb
John Robb

Exploiting the Robocaller Gap

Here's an interesting US systempunkt — a systempunkt is the point in a big network where even a small attack would cause the entire network to fail. This systempunkt would enable a prepared individual the unique ability to shut down a large part of the US without shedding a drop of blood. For example, this attack has the ability to:

Read full article.

Continue reading “John Robb: Bringing Down the (Corrupt) USA”

Stephen E. Arnold: Time as Analytic Factor — Recorded Future, Google, and CyberOSINT

Advanced Cyber/IO, IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Recorded Future: Google and Cyber OSINT

EXTRACT: CyberOSINT relies on automated collection, analysis, and report generation. In order to make sense of data and information crunched by an NGIA system, time is a really key metatag item. To figure out time, a system has to understand: 1) The date and time stamp; 2) Versioning (previous, current, and future document, data items, and fact iterations); 3) Times and dates contained in a structured data table; 4) Times and dates embedded in content objects themselves; for example, a reference to “last week” or in some cases, optical character recognition of the data on a surveillance tape image. Learn more.

See Also: Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele

Stephen E. Arnold: Autonomy – Leader of a Sorry Pack

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Autonomy: Leading the Push Beyond Enterprise Search

In “CyberOSINT: Next Generation Information Access,” I describe Autonomy’s math-first approach to content processing. The reason is that after the veil of secrecy was lifted with regard to the signal processing`methods used for British intelligence tasks, Cambridge University became one of the hot beds for the use of Bayesian, LaPlacian, and Markov methods.

Continue reading “Stephen E. Arnold: Autonomy – Leader of a Sorry Pack”

Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy

Advanced Cyber/IO, Cultural Intelligence, Ethics, Government, IO Impotency
Martin Petersen
Martin Petersen

What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers

Martin Petersen, Studies in Intelligence, 2011

PDF (8 Pages): Petersen-What I Learned-20Apr2011

Policymakers do not always see how we can help them.

Continue reading “Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy”

Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele

Advanced Cyber/IO, IO Impotency
Click on Image to Enlarge
Click on Image to Enlarge

An Arnold IT CORE Report for Law Enforcement, Security and Intelligence Professionals and Organizations

This monograph has a single goal: Provide a Contracting Officer (CO) or Contracting Officer's Technical Representative (COTR) — or the end-user engaged in investigatory work, military operations, and intelligence activities — with a collection of technology capability summaries about companies building next-generation tools…critical insights that could save millions in mis-placed capitalization.

“CyberOSINT is the first discussion of the innovative software that makes sense of the flood of open source digital information. Law enforcement, security, and intelligence professionals will find this an invaluable resource to identify automated ways to deal with Big Data.”

– Dr. Jerry Lucas, President, Telestrategies ISS

Table of Contents with topics covered and companies profiled below the line along with full-text of the Foreword by Robert Steele and Preface by Stephen Arnold.

Continue reading “Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele”